Solaris is pwned by a similar vulnerability to one discovered on AIX systems in 1994.
Yes people that’s 13 years ago…and Sun are still vulnerable, as reported by SANS.
The following will give you root on a lot of Solaris systems:
telnet -l "-froot" [hostname]
The Internet Storm Center is urging system administrators to disable or restrict telnet functionality to contain the zero-day vulnerability, which, according to center, affects only the most recent versions of Solaris and OpenSolaris.
Sun executives talk up secure Solaris at just about every turn. However, some simple tinkering with the OS’s telnet user environment variable can give outsiders free reign with no authentication requirements. No special tools are required to exploit the vulnerability. Sans has long urged against the use of reusable clear-text passwords when administering telnet.
A Sun spokesman says the company has been able to verify the vulnerability and is in the process of testing a fix. He also says that by default telnet is disabled in Solaris 10, and users would have to follow a series of steps to enable it and even more to allow it to administer root privileges. Sun has long recommended Solaris SecureShell as a more secure alternative to telnet.
So disable telnet now, if you haven’t already..Yes I know Sun are still teaching people to use telnet in their classes, which I find kind of sad.
Like someone else said, I doubt any of us would even use telnet on an exposed system…but we have all worked for corporations or seen people that would.
Source: The Register
Recent in Exploits/Vulnerabilities:
- 2 Different Hacker Groups Exploit The Same IE 0-Day
- Researchers Crack 4096-bit RSA Encryption With a Microphone
- vBulletin.com Hacked – Forum User Emails & Encrypted Passwords Leaked
- Sun Solaris 10 – Free Offer – Media DVD
- Chaosreader – Trace TCP/UDP Sessions from tcpdump
- Critical Zero Day Abobe Flash Flaw Puts Android Phones At Risk
Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 224,490 views
- AJAX: Is your application secure enough? - 118,889 views
- eEye Launches 0-Day Exploit Tracker - 84,983 views